CVE-2026-40563
Description
Description: Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Atlas Apache Atlas exposes a DSL search endpoint that accepts user-supplied query strings. Attacker can alter Gremlin traversal logic within grammar-allowed characters to access unintended data
Affect Version: This issue affects Apache Atlas: from 0.8 through 2.4.0.
For the affect version >= 2.0, vulnerability is only when Atlas is deployed with below non-default configuration.
atlas.dsl.executor.traversal=false
Mitigation: Users are recommended to upgrade to version 2.5.0, which fixes the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.atlas:apache-atlasMaven | >= 0.8, < 2.5.0 | 2.5.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.openwall.com/lists/oss-security/2026/05/03/9nvdMailing ListThird Party AdvisoryWEB
- github.com/advisories/GHSA-35xx-9xrg-gwhfghsaADVISORY
- lists.apache.org/thread/vd0oggmqxl2k1skm0z2f9p0plx7jhmflnvdMailing ListVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-40563ghsaADVISORY
News mentions
0No linked articles in our index yet.